Toward a Framework for Internet Forensic Analysis

نویسندگان

  • Vyas Sekar
  • Yinglian Xie
  • David A. Maltz
  • Michael K. Reiter
  • Hui Zhang
چکیده

The world of network security is an arms race where attackers constantly change the signatures of their attacks to avoid detection. Aiding the white-hats in this race is one fundamental invariant across all network attacks (present and future): for the attack to progress there must be communication among attacker, the associated set of compromised hosts and the victim(s), and this communication is visible to the network. We argue that the Internet architecture should be extended to include auditing mechanisms that enable the forensic analysis of network data, with a goal of identifying the true originator of each attack — even if the attacker recruits innocent hosts as zombies or stepping stones to propagate the attack. In this paper we outline an approach to the problem of Attacker Identification and Attack Reconstruction, describe the challenges involved, and explain our efforts that show the promise of this approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey about Network Forensics Tools

This paper gives an overview about the main tools and techniques available to ensure forensic investigations of network security attacks. Given that Web and Email services are the most common used network communication schemes, we mainly focus on the forensic investigation of Email and Web services attacks. Moreover, we present a set of forensics tools used for network traffic capture such as S...

متن کامل

Introduction of a Framework for Customer Orientation Using Ambulant E-Banking Services Marketing (Case Study: Mellat Bank in Isfahan)

E-banking (electronic banking) is the modified business banking toward E-business (electronic business) banking that actually uses the electronic communication channels such as internet, phones, cell phones and the like. By using this method, the demands of customers such as time independent and high flexible actions are satisfied. In this process, marketing is so important because guiding cust...

متن کامل

Internet Forensics Framework Based-on Clustering

Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators of DoS attacks, is when legitimate users cannot access the system. This paper proposes a framework for Internet based forensic logs that aims to assist in the investigation pro...

متن کامل

Introduction of a Framework for Customer Orientation Using Ambulant E-Banking Services Marketing (Case Study: Mellat Bank in Isfahan)

E-banking (electronic banking) is the modified business banking toward E-business (electronic business) banking that actually uses the electronic communication channels such as internet, phones, cell phones and the like. By using this method, the demands of customers such as time independent and high flexible actions are satisfied. In this process, marketing is so important because guiding cust...

متن کامل

Forensic hash for multimedia information

Digital multimedia such as images and videos are prevalent on today’s internet and cause significant social impact, which can be evidenced by the proliferation of social networking sites with user generated contents. Due to the ease of generating and modifying images and videos, it is critical to establish trustworthiness for online multimedia information. In this paper, we propose a new framew...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004